Skip to main content
THE LINUX FOUNDATION PROJECTS
All Posts By

Shane Coughlan

Shane Coughlan is an expert in communication, security and business development. His professional accomplishments include spearheading the licensing team that elevated Open Invention Network into the largest patent non-aggression community in history, establishing the leading professional network of Open Source legal experts and aligning stakeholders to launch both the first law journal and the first law book dedicated to Open Source. Shane has extensive knowledge of Open Source governance, internal process development, supply chain management and community building. His experience includes engagement with the enterprise, embedded, mobile and automotive industries.

COMING SOON: OpenChain Webinar – OIN: A Conversation About the Journey So Far and Preview of OIN 2.0 – 2025-11-25 @ 16:00 PST – 2025-11-26 @ 08:00 CST / 09:00 KST+JST

By News

OpenChain will host a special webinar on 2025-11-25 @ 16:00 PST – 2025-11-26 @ 08:00 CST / 09:00 KST+JST entitled “OIN: A Conversation About the Journey So Far and Preview of OIN 2.0.”

Featuring an open discussion between Keith Bergelt, CEO of OIN and Shane Coughlan, GM of OpenChain, we will unpack the evolution of patent non-aggression in the open source ecosystem, and explore what is coming next for existing and potential new licensees of the OIN System Definition.

This will be a key discussion for those interested in addressing patent risk and containment strategy, and is recommended for legal, project management and executive teams.

Join here @ 16:00 PST – 2025-11-26 @ 08:00 CST / 09:00 KST+JST:
https://zoom-lfx.platform.linuxfoundation.org/meeting/93064800269?password=7e728b97-7be0-488f-8a89-e12d7f864eea

OpenChain @ Deloitte Global IT Asset Management (ITAM) Survey 2025

By News

The industry has spoken, and there are some concerns about governance we need to address.

The Deloitte Global IT Asset Management (ITAM) Survey 2025 uncovered this important insight: “preparedness around open-source software remains a blind spot. Only 17% of respondents have a dedicated Open-Source Program Office (OSPO) or equivalent framework. Just 7% align this function to recognised standards such as ISO/IEC 5230 and 18974, while the remaining 10% operate without reference to any formal framework.”

See page 15 and 16:
https://hubs.la/Q03TS8PJ0

Clearly, while we have collectively made significant progress around building a more trusted supply chain, there is a long distance to go.

You can be part of the solution by contributing to the OpenChain community as we address process management for open source license compliance, security assurance, SBOM quality and – most recently – AI system bill of material compliance. Learn more here:
https://hubs.la/Q03TS8hm0

OpenChain Newsletter #83

By Monthly Newsletter, News

Newsletter – Issue 83 – October 2025

The OpenChain Newsletter provides a monthly summary of our work. It contains an overview of what we are doing to build trust around license compliance and security in the open source supply chain. We accept suggestions and ideas. Feel free to mail us at any time.

Headline News

Conformance Announcements

Two more companies have announced conformance with OpenChain ISO/IEC 5230, strengthening their software supply chain management:

Recorded Meetings

Several working group and specification calls were recorded. You can watch these to catch up on detailed discussions across various compliance topics.

OpenChain @ Events

OpenChain continues to have a strong presence at global events, discussing compliance, data protection, and open source management.

New Partner Announcements

The OpenChain ecosystem continues to grow with new partners.

Get Involved

  • Potential Action: The numerous recorded meetings from the AI, SBOM, and Telco work groups highlight the ongoing discussions in the community. You can join these future meetings to stay current and contribute.
  • To participate in the working groups, join mailing lists, and attend calls, visit: https://openchainproject.org/participate

Note: This newsletter usually only contains primary meetings. Some community meetings are not recorded or are released through other channels.

Read Previous Newsletters:

AI Usage:

This newsletter is created by using a template, curating links from a month of OpenChain news posted on the blog and using these prompts on Google Gemini to fill out the central news:

  • “Summarize the following newsletter for folks interested in the open source compliance to learn the latest changes in the space and find possible items that can act on. Include the links in this newsletter. Add notes on potential further actions by readers, particularly around attending future meetings. Direct people to this link to participate further: https://openchainproject.org/participate”

The newsletter is then subject to an edit cycle. If you spot any errors we missed, please contact us.

Public Comment Period – Cross-Industry SBOM Quality Guide – Ends 30th January 2026

By unlisted

Happening Now:

We are announcing a public comment period for the Cross-Industry Guide to SBOM Quality that has been developed by the OpenChain SBOM Work Group.

Why This Is Happening:

The OpenChain Project has a formal process for public comment periods related to important releases like the Cross-Industry SBOM Quality Guide. These public comment periods signify that we have completed work on a topic, and now want to ensure people outside of the OpenChain Project and its work groups can provide additional input as needed. After the public comment period, we formally release the relevant document.

You can read the full process (and our other processes) here: https://openchainproject.org/processes#process-public-comments

How This Works:

We are accepting comments via our SBOM Work Group mailing list and through our monthly calls. The recommended way of providing feedback is via the mailing list.

You can find the URL for the mailing list here: https://lists.openchainproject.org/g/sbom

You can find our SBOM Work Group calls (and all other OpenChain calls) list here: https://openchainproject.org/participate

RECORDING: OpenChain Telco Work Group – 2025-11-06

By News

Attendees:

  • Shane Coughlan, OpenChain manager
  • Norio Koboto, Sony
  • Masahiro DAIKOKU, KDDI Corporation
  • Jari Koivisto, Analog Devices
  • Marc-Etienne Vargenau, Nokia

We have no news from CISA about our comments on their Minimum Elements document, due to the current shutdown in the US. Our comments are visible, but not all. The comments sent by Nokia on the last possible day are not yet visible.

There are comments from big companies, smaller companies, and individuals.

Some comments give different opinions on the document. For example, some comments are in favor of including the license information, and others are against it, as they consider it is unrelated to security.

In the Telco Guide version 1.0 and 1.1, the license information is mandatory, but the value might be NOASSERTION, which is equivalent to not providing the information. In the draft of version 1.2, we have disallowed this value, so that the real license information is provided. We will keep this or not depending on the content of the final version of the CISA document.

Shane explains there have been layoffs at CISA and currently two thirds of the employees are not in office. Allan Friedman has left CISA and his replacement is not in office due to the shutdown.

In the October meeting, we had discussed the encryption proposal text from Jimmy. Jimmy will propose a better wording; he could not do it today as he is travelling in Asia.

A small bug was found in the validator in the handling of the CISA SBOM Type. A new minor release will be published soon.

In the October meeting, it was suggested that the Telco validator could validate SPDX 3. This is currently difficult to implement, as the validator uses to parse the SBOM the Python library https://github.com/spdx/tools-python that does not currently support SPDX 3. There has been no update of the library since more that 1 year, but a new maintainer has been nominated, so we hope there will be a new release soon.

We review the document from the SBOM working group, especially the part about the Telco Guide, available athttps://docs.google.com/document/d/1iuXX8j10N70dfce1-CZFWhW6S2jEqc–flcCgXMMdjg/edit?tab=t.0#heading=h.ayxknpo2zsfl.

We first review the table listing the fields present in the Telco Guide (section 6.4) Everything seems OK, but we have a discussion on the Telco Guide section 3.5 “SBOM Build information”. It is suggested to rename it to “SBOM Document Build information” in order not to confuse the build of the software and the creation of the SBOM.

In section 6.3 of the document, we have the fields from the last version of the BSI document.

In this last version 2.1.0, they mandate the use of SPDX 3.0.1 or later instead of 2.2.1 or later. This seems a bit premature to us, as many tools still produce only SPDX 2.2 or 2.3. This is for example the case for BlackDuck.

Jari reports a remark from Philippe Ombredanne explaining that the most important thing for a good SBOM is the content and not the format. Many SBOMs are incomplete or contain wrong information.

The document lists several possible identifiers for a package (SWHID, PURL, CPE or the URL of the package distribution site), whereas in the Telco Guide, we recommend only PURL (Package URL). Package URL will become an ECMA standard, then will be fast-tracked to ISO. We do not know when the ISO standard will be published, but Shane’s experience is that it takes about 9 months for an official standard such as ECMA to become an ISO standard.

It is difficult to express the “known unknowns” in SPDX. Norio Koboto-san point out that they are often not provided.

The document gives examples of different naming of packages. This is a recurrent problem; different tools name them differently.

The document uses the words SHALL, SHOULD, etc. in upper case, but the RFCs that define this usage are not present. We recommend adding them to the document as we have done in the Telco Guide.

Everyone is encouraged to provide comments on the document as soon as possible in order that it can be presented at the Open Compliance Summit Japan in December.

Watch the Recording:

Be part of this:

Everyone is welcome to be part of this study group! OpenChain has free, open access to all its work groups and study groups. Just turn up, and listen in, and contribute comments, ideas and suggestions.

✉️ We have a dedicated mailing list:
https://lists.openchainproject.org/g/telco

💻 We have a dedicated GitHub Repo:
https://github.com/OpenChain-Project/Telco-WG

You are also welcome to participate in any of our other working groups around the world:

CJ Logistics Becomes First in Korean Logistics Industry to Adopt OpenChain ISO/IEC 5230

By Featured, News

CJ Logistics announced on the 5th that it has obtained ‘OpenChain ISO/IEC 5230:2020′ international standard certification.

The OpenChain Project, an initiative led by the U.S. non-profit organization The Linux Foundation, maintains  ‘ISO/IEC 5230:2020’ and provides self-certification support to companies. These companies can use the standard and self-certification material to audit and develop a robust open source license compliance program and management capabilities.

This achievement is the first of its kind among Korean logistics companies and signifies that CJ Logistics has received international recognition for its responsible management of open source software throughout its digital transformation.

About the OpenChain Project:

The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs.

About The Linux Foundation:

The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org.

Check Out The Publicly Announced Community of Conformance:

Telechips Announces an OpenChain ISO/IEC 5230 Conformant Program

By Featured, News

Telechips, a leading global fabless company specializing in SoC (System on Chip) solutions for automotive and smart devices, has announced an OpenChain ISO/IEC 5230 conformant program.

“The acquisition of OpenChain certification demonstrates that Telechips has advanced beyond simply utilizing open source to establishing systematic management capabilities and transparent governance in compliance with global standards,” said Jiyoung Yeon, Open Source Manager at Telechips. “Building on our technological expertise and trusted reputation in automotive semiconductor design, we will continue to strengthen transparent open source operations—such as Software Bill of Materials (SBOM) management—and actively contribute to the growth of the global open source ecosystem and the establishment of sustainable technology standards.”

“We are delighted to welcome Telechips to the OpenChain Community of Conformance,” says Shane Coughlan, OpenChain General Manager. “This is another landmark in demonstrating the applicability of our ISO standard for open source license compliance with industries of all types across the global supply chain. We look forward to working with our colleagues at Telechips and with other companies in the silicon domain on the management of open source.”

About Telechips:

Telechips is a leading global fabless company specializing in SoC (System on Chip) solutions for automotive and smart devices. With more than 25 years of innovation and expertise, Telechips provides high-performance and secure semiconductor platforms that power next-generation infotainment, digital cluster, ADAS, and connectivity systems. As the industry rapidly shifts toward SDVs (software-defined vehicles), we are expanding beyond our core in-vehicle infotainment application processors (APs) to a next-generation lineup that includes MCUs, ADAS solutions, and in-vehicle networking.
Backed by globally competitive high-performance, low-power SoC design capabilities and customer-tailored solutions, Telechips is accelerating its entry into the global SDV market. We also practice ESG management to help build a sustainable future. Guided by our vision—“New innovations for the future our customers want”—we partner with global customers to shape a better tomorrow.

About the OpenChain Project:

The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs.

About The Linux Foundation:

The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org.

Check Out The Publicly Announced Community of Conformance:
https://openchainproject.org/community-of-conformance

OpenChain Automotive Work Group Workshop – 2025-11-14 @ 09:00 ~ 12:00 CET

By News

The OpenChain Automotive Work Group is holding a special workshop on the 14th of November at 09:00 ~ 12:00 CET Brussels/Europe.

Join Us:

Dial into the event at https://zoom-lfx.platform.linuxfoundation.org/meeting/93221191904?password=fc945fdc-322f-4272-9b0b-7c1a92fb4a9e.

The meeting invite has also been shared in the Open Chain Automotive workgroup mailing list: https://lists.openchainproject.org/g/automotive-wg

Overview:

Please note: as with everything in the OpenChain Project, this event belongs to the community. Our schedule is created in collaboration with the people who will attend, and therefore you should feel free to make suggestions.

Registration:

This is a meeting of the OpenChain Automotive Work Group. This meeting is open to everyone, and will feature talks and discussion around tooling, the supply chain, compliance and regulatory matters. No registration required.

Agenda (times in CET):

Please note: the “living agenda” is on GitHub, and the information below is subject to change.

  • 09:00: Opening and introductions

    • 09:00: ‘Opening Greeting and Review of Core Topic’ – ‘ISO/IEC 5230, ISO/IEC 18974 and ISO/IEC 5962 – How updates to international standards for open source license compliance, security assurance and SBOM impact the automotive supply chain’
      • by Shane Coughlan, OpenChain
      • by Masato Endo, Toyota
  • ~09:10 TOP1 SBOM activities and Cybersecurity regulations

    • 09:10: ”SBOM Implementation – status of SBOM Quality Guide and Automotive SBOM’
      • by Norio Kobota, Sony/OpenChain SBOM Work Group
      • by Ayumi Watanabe, Hitachi-Solutions
    • 09:30: ‘Catena-X Expert Group Software and how the new Car SBOM Standard is intended to be used in the context of new Cybersecurity regulations’ Catena-X / Eclipse Tractus-X
      • by Alexander Denk, BMW, Catena-X Expert Group Software
    • 09:45: ‘SPDX Version 3.x – overview, differences to 2.x and benefits for the supply chain of switching to the new version + outlook on upcoming Version 3.1 with new profiles’
      • by Alexios Zavras, Intel/SPDX Project
    • 10:00: ‘CycloneDX Version 1.7 – overview, differences to 1.6 and benefits for the supply chain of switching to the new version’
      • by Jan Kowalleck, OWASP/CycloneDX
    • 10:15: ‘SBOMs quo vadis? – panel discussion on the current landscape’
      • moderated by Chloe Zhong
    • potential follow up in https://lists.openchainproject.org/g/sbom
  • ~10:35: TOP2 SBOM, Security and Open Source Management Tooling

    • 10:35: ‘A publicly available supply-chain simulation based on Open Source tools – status and outlook’
    • FLASHLIGHTS on relevant Project Updates (5 min max.)
    • 10:45: ‘Cybersecurity tools for automotive and beyond – status and outlook’
      • by Dirk Targoni, ASRG.io – Chapter Stuttgart
    • 10:50: ‘OCCTET project – status and outlook’
      • by Sebastien Heurtematte, Eclipse Foundation
    • 10:55: ‘SEPIA project – status and outlook’
      • by Rakesh Prabhakaran, Bosch Global Software Technologies
    • 11:00: ‘Eclipse Disuko – SBOM-portal – status and outlook’
      • by David Schumm, Mercedes Benz
      • by Christian Wege, Mercedes Benz
    • potential follow up in https://groups.io/g/oss-based-compliance-tooling
  • ~11:10: TOP3 Safety Software Supply Chain

  • ~11:30: TOP4 Challenges of Automotive Open Source Program Offices and Business

  • ~11:50: TOP5 Open discussion, future planning and closing

    • 11:50: Outlook on the 2026 Open Source Events with Automotive relevance
      • by Marcel Kurzmann, Bosch/OpenChain
  • 11:55: Close and Goodbye

NXP Semiconductors Announces an ISO/IEC 5230 Conformant Program

By Featured, News

NXP Semiconductor, a company that designs purpose-built, rigorously tested technologies that enable devices to sense, think, connect and act intelligently, has announced an OpenChain ISO/IEC 5230 conformant program.

“This achievement shows our strong commitment to both using and contributing to Open Source Software and our effort to keep the highest standards for software integrity and legal adherence,” says Ileana Bratu, Open-Source Operations Manager at NXP. “Compliance goes beyond certification; it is part of our engineering mindset. We will keep improving our open source compliance program, give continuous training and encourage a culture of awareness and responsibility in all development teams.”

“It is a deep pleasure to welcome NXP to the OpenChain community,” Shane Coughlan, OpenChain General Manager. “The automotive and semiconductor industries share a deep bond not only in product, but also in how they apply rigor to process management, regulatory compliance and excellence in management. I am grateful to work alongside companies like NXP in developing a more trusted global supply chain”

About NXP Semiconductors:

NXP Semiconductors N.V. (NASDAQ: NXPI) is the trusted partner for innovative solutions in the automotive, industrial & IoT, mobile, and communications infrastructure markets. NXP’s “Brighter Together” approach combines leading-edge technology with pioneering people to develop system solutions that make the connected world better, safer, and more secure. The company has operations in more than 30 countries and posted revenue of $12.61 billion in 2024. Find out more at http://www.nxp.com/.

NXP and the NXP logo are trademarks of NXP B.V. All other product or service names are the property of their respective owners. All rights reserved. © 2025 NXP B.V

About the OpenChain Project:

The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs.

About The Linux Foundation:

The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org.

Check Out The Publicly Announced Community of Conformance:
https://openchainproject.org/community-of-conformance

Webinar: Containers and Compliance

By legal, licensing, News, security, Webinar

This was an exceptionally popular (over 50 attendees). Unfortunately, we had a recording mishap and are unable to bring you the full panel discussion. However, we are providing a summary below alongside the slides used.

Quick Recap

Our Panelists:

  • Chair: Chris Wood
  • Caren Kresse
  • Heather Meeker
  • Mary Hardy
  • Till Jaeger

The meeting focused on discussing open-source containers, package managers, and compliance challenges, with panelists exploring issues around transparency, licensing information, and source code access. The group examined limitations in package manager information and binary scanning capabilities, discussing how incomplete or incorrect licensing data can hinder true compliance. The panel emphasized the importance of proper license declarations and developer awareness, while exploring potential solutions for addressing licensing issues in containerized environments and discussing the need for improved compliance automation tools.

Summary

Source Container Compliance Challenges:

The meeting focused on open-source containers, package managers, and compliance, with Chris chairing the discussion and introducing panelists including Karen from OSADL, Till, and others. Chris raised concerns about the transparency of package managers, noting that some widely used products lack sufficient licensing information and do not provide SBOMs or source code access, which may hinder true license compliance. The panelists were asked to share their thoughts on these issues.

Improving Open Source Compliance Tracking:

The panel discussed the limitations of package manager information for source compliance, with Caren, Heather, and Mary agreeing that package managers often provide incomplete, outdated, or incorrect licensing information. They emphasized the need to improve provenance tracking and source code analysis rather than relying solely on meta-information. Till explained that package managers can only use the information provided by open source projects, which is often insufficient. Mary noted a public database, ClearlyDefined, contains metadata for open source packages, including licenses discovered during scanning. It can be used as a reference during container content analysis. There is still some human curation for packages that have missing top-level license information, but at least it only needs to be completed once. The group also addressed the limitations of license scanners, noting that many only analyze the top-level license of binaries, which may not reflect the true complexity of the software’s licensing structure.

Binary Scanner Limitations and Potential:

The group discussed the limitations and potential of binary scanners in identifying licensing information. Caren emphasized the need for binary scanners to trace the origin and build information of binaries to extract licensing details, while Heather highlighted the evolution of scanning tools from line-by-line source code analysis to higher-level scans, noting a potential resurgence in detailed scanning due to AI coding tools. Mary mentioned ongoing experiments using AI to improve the detection of binary origins, and Till explained the convenience of binary scanning for large dependency trees but stressed the need for source code for comprehensive compliance. Florian raised concerns about relying solely on third-party binary scanning for compliance, and Stefan questioned the discrepancies in license declarations between Maven and GitHub, which Caren and Till acknowledged as a challenge due to incomplete or outdated meta-information.

Software Licensing Awareness and Management:

The panel discussed the importance of proper license declarations in software development, emphasizing the need for awareness training among developers to ensure accurate declarations. They highlighted the role of configuration management in preventing issues related to incorrect licensing, with Marcel explaining that the default Apache license in Maven requires explicit changes for different licensing. The group also addressed the limitations of binary scanning in identifying license information, with Till suggesting a theoretical approach using a database to link source code and binary information. Chris raised a question about remediation options for non-compatible licenses in containerized environments, which the panel acknowledged as an open issue.

Container Licensing Compliance Challenges:

The panel discussed challenges in container and package manager compliance, focusing on how to address licensing issues when using non-modified binary formats. Heather noted that license disclosures for pre-built containers have improved over time, and suggested working with upstream sources for remediation, while Caren emphasized engaging with source projects to resolve licensing problems. The group agreed that developer awareness of licensing requirements is crucial, particularly for containers, and Till highlighted the importance of using compliant and trusted base images. The panel expressed hope for improved tools to automate compliance processes in the future.

Read the Slides:

More About Our Webinars:

This event is part of the overarching OpenChain Project Webinar Series. Our series highlights knowledge from throughout the global OpenChain eco-system. Participants are discussing approaches, processes and activities from their experience, providing a free service to increase shared knowledge in the supply chain. Our goal, as always, is to increase trust and therefore efficiency. No registration or costs involved. This is user companies producing great informative content for their peers.

Check Out The Rest Of Our Webinars

This OpenChain Webinar was broadcast on 2025-10-29.